|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2012 | Vol. 37 No.2 |
Title: |
SOME METHODS TO TREAT CAPACITY ALLOCATION
PROBLEMS |
Author: |
A. IDRISSI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 141 - 158 Vol 37. No. 2 -- 2012 |
Abstract |
The Constraint Satisfaction Problems (CSP)
are proven more and more promising to model and solve a large number of real
problems. A lot of approaches using constraint reasoning have been proposed to
solve search problems. Our contributions here consist to propose a modeling of
Capacity Allocation Problem of an airport (CAP) in the form of a CSP. This
modeling produces a model which we call CSPAC. Then, we generalize this model to
the fixes of the airport and call the new model GCSPAC. Thereafter, we describe
an approach combining the branch-and-bound algorithm and local search to solve
both CSPAC and GCSPAC. This method allows assisting the airport managers to
regulate the arrival/departure predicted demands and to optimize the utilization
of the available capacities of a terminal. Finally, we expose some experimental
results showing the utility of our different approaches. |
Keywords |
Constraint Optimization, Modeling,
Solving, Capacity Allocation Problems. |
Full Text |
|
Title: |
DYNAMIC INTERACTIVE 3D MOBILE NAVIGATION
AID |
Author: |
A.I. ADAMU, T. MANTORO, M.A SHAFII |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 159 - 170 Vol 37. No. 2 -- 2012 |
Abstract |
This paper presents the mechanism of
multi-user navigation interaction in real-time as a high-priority objective in
improving mobility services efficiency and effectiveness, and investigate the
support of three-dimensional representation in mobile device in aiding
interactive navigation in an unknown environment. The paper is based on the fact
that the use of 3D representation in mobile device is more intuitive than the
conventional 2D representation. Unfortunately, Mobile devices are small devices,
and that is why there are mobile, as a result, 3D dataset in mobile device might
overload its performance. Even though, certain techniques were seen in many
research on tackling this problems, yet, when it comes to the navigation aid the
predominant 3D mobile navigation system are not interactive in real-time, that
is a user will not be aware of other users while on-the-go and both using mobile
navigation aid in the same environment. We provide an interactive navigation
techniques for finding the shortest path to a desire destination and also been
able to interact with an (agent if it’s another user) or (object in terms of
point or destination) in real-time with the help bi-A* pathfinding algorithm and
voronoi diagram. The use of bi-A* Algorithm is to establish a forward and
backward search for a destination or a position of users, while the use of
voronoi diagram is to establish points and region within the navigation
environment. The result of our finding indicate that information in
three-dimension for navigation aid in mobile device is more intuitive and
experimental result shows that multi-user interaction with support of 3D
representation in mobile devices helps in aiding number of user going around
within an environment an been able to be aware of their movement in real-time.
This approach is unique because it provides visualization of 3D representation
(map) in mobile devices’ which assists users to navigate interactively. |
Keywords |
Mobile navigation, 3D representation
(map), Voronoi diagram, Bi-A* Pathfinding |
Full Text |
|
Title: |
GENETIC ALGORITHM BASED BOWLING COACH FOR
CRICKET |
Author: |
HASHAM SHIRAZ ALI, UMAR NAUMAN, FARAZ
AHSAN, SAJJAD MOHSIN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 171 - 176 Vol 37. No. 2 -- 2012 |
Abstract |
Sports are not only means of attaining
physical fitness, rather nowadays have become a scientific field where
statistical analysis play a vital role to overcome one’s weaknesses and exploit
that of opponents’. Similarly, in Cricket, bowling in the right areas has always
been a headache for the bowlers and the coaches alike, not because bowlers are
not accurate enough, but because the ‘right areas’ vary greatly according to the
weather, pitch conditions, field placing, ball condition etc. Above all, the
strengths and weaknesses of each batsman varies. With so many variables to
consider while bowling, it is hard for a coach to figure out which area is the
right one, leaving the bowler with no option other than to stick to the basics.
We propose Genetic Algorithms to help the bowler in selecting the right areas to
bowl to a particular batsman hence solving this rather difficult coaching
problem in a straightforward manner. |
Keywords |
Genetic Algorithm, Cricket, Artificial
Intelligence, Bowling Strength, Batsman Weakness |
Full Text |
|
Title: |
MODELING AND IMPLEMENTATION OF A
MULTI-AGENT ARCHITECTURE FOR INTELLIGENT ENERGY MANAGEMENT IN AN ELECTRIC
VEHICLE |
Author: |
ALI YAHYAOUY, JALAL SABOR, HAMID GUALOUS,
MOHAMED LAMRINI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 177 - 187 Vol 37. No. 2 -- 2012 |
Abstract |
Hybrid vehicles and energy management is
now a fertile area of research and development. The aim of this paper is to
contribute to the tools development for energy management and collaborative
decision-making in hybrid electrical vehicles. We propose a multi-agent system
for intelligent energy management. To test the designed and developed system, we
have used a vehicle powered by a hydrogen fuel cell and a pack of
supercapacitors. This system is based on the state of charge of supercapacitors
to share optimally and instantaneously the power demand between these sources.
Thus, the system's role is to improve the vehicle autonomy and longevity of the
components of its supply system. |
Keywords |
Multi-Agent System, Language AUML, JADE,
Intelligent Energy Management, Hybrid Electric Vehicle, Super Capacitors, Fuel
Cell |
Full Text |
|
Title: |
IMPACT OF DISASTERS IN SOUTHEAST ASIA ON
MALAYSIAN COMPUTER NETWORKS |
Author: |
RABAB A. ABBAS, MOHD ROSMADI MOKHTAR,
ROSSILAWATI SULAIMAN,
ZULAIHA ALI OTHMAN, ABDULLAH MOHD ZIN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 188 - 198 Vol 37. No. 2 -- 2012 |
Abstract |
Disaster is an old challenge to the human
society, which is continuously presenting new threats to society and its way of
life. Thus, it is important for us to find ways to help mitigate these threats
and to provide the society with better solutions to cope with disaster. Over the
past decades, disasters have also caused damaged to telecommunication
infrastructure, and thus affecting computer networks. In the world that now
depends heavily on Internet and computer-based communication, damaged to
computer networks will cause a lot of problems to any countries. Most of the
work that address the issue of disasters and computer networks role focuses on
reestablishing services after the impact. Although this is important, much
research is needed in anticipating their impact of disasters on computer
networks. This paper aims to propose a model for evaluating changes in Malaysian
computer networks traffic caused by a regional disaster in some other part of
South East Asia. The model deals with the possibility of a disaster that
triggers additional disasters that may lead to more network failure. |
Keywords |
Disaster Planning, Network Planning,
Network Survivability, Telecommunication. |
Full Text |
|
Title: |
ZIGBEE AND GSM BASED SECURE VEHICLE
PARKING MANAGEMENT AND RESERVATION SYSTEM |
Author: |
ASWIN SAYEERAMAN, P.S.RAMESH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 199 - 203 Vol 37. No. 2 -- 2012 |
Abstract |
Wireless technology is an emerging
technology. This paper discuss about the secure car parking and reservation
system using wireless technologies. The system includes three modules, parking
lot vacancy monitoring module, parking lot reservation module, and security
module. Parking lot vacancy monitoring module includes infrared sensors and
Zigbee modules which are interfaced with PIC Microcontroller. Vacancy monitoring
module detects the presence of vehicle in the parking areas and provide the
status to the users in real time. Reservation module includes GSM modem which is
interfaced with a coordinator system. The user can book their parking spots
through SMS. Security module includes set of rules which ensures the security of
user’s vehicle parked in their reserved parking spots. Security is one of the
main concerns in this paper. If user’s vehicle has been accessed by an
unauthorized person, SMS based indication will be provided and also the system
will not allow the vehicle to exit from the parking bay .This system suits well
for multilevel and closed underground car parking systems. |
Keywords |
Smart Parking, Security, Zigbee, Xbee, GSM,
SMS, Parking Reservation |
Full Text |
|
Title: |
CLASSIFICATION AND EVALUATION THE PRIVACY
PRESERVING DISTRIBUTED DATA MINING TECHNIQUES |
Author: |
SOMAYYEH SEIFI MORADI, MOHAMMAD REZA
KEYVANPOUR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 204 - 210 Vol 37. No. 2 -- 2012 |
Abstract |
In recent years, the data mining
techniques invarious areas have met serious challenges
increasingconcernsaboutprivacy. Different techniques and algorithms have been
already presented for Privacy preserving data mining (PPDM), which could be
classified in two scenarios: centralized data scenario and distributed data
scenario. This paper presents a Framework for classification and evaluation of
the privacy preserving data mining techniques for distributed data scenario.
Based on our framework the techniques are divided intothree major groups, namely
Secure Multiparty Computation based techniques, Secret Sharing based techniques
and Perturbation based techniques.Also in proposed framework, seven functional
criteria will be used to analyze and analogically evaluation of the techniques
in these three major groups. The proposed framework provides a good basis for
more accuratecomparison of the given techniques to privacy preserving
distributed data mining. In addition, this framework allows recognizing the
overlapping amount for different approaches and identifying modern approaches in
this field. |
Keywords |
Privacy Preserving Distributed Data Mining
(PPDDM), Secure Multiparty Computation (SMC), Perturbation, Secret Sharing |
Full Text |
|
Title: |
EFFICIENT RESOURCE UTILIZATION OF WEB
USING DATA CLUSTERING AND ASSOCIATION RULE MINING |
Author: |
ILAMPIRAY. P |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 211 - 216 Vol 37. No. 2 -- 2012 |
Abstract |
Data mining is a dominant technology which
extorts the hidden information from the huge databases. Data mining techniques
envisage future progressions and trends, acquiesce businesses to make practical,
knowledge-actuate arbitration. Data clustering and association rule mining has
attracted a lot of research interest in field of computational statistics and
data mining. Web usage mining is an important application of data mining
techniques and it is used to determine user navigation pattern from web log
data. In this paper, the clustering technique is applied for grouping the users
based on the ip address and association rule mining is used for finding the
associations between the clustered groups. A hybrid Leaders complete linkage
algorithm is used for clustering the users into groups and the Apriori algorithm
is used for finding associations between the users. This approach reveals the
individual access pattern of users. |
Keywords |
Hierarchical Clustering, Incremental
Clustering, Web Usage Mining, Association Rule Mining. |
Full Text |
|
Title: |
NOVEL HYBRID TECHNOLOGY IN ATM SECURITY
USING BIOMETRICS |
Author: |
SANTHI.B,RAM KUMAR.K |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 217 - 223 Vol 37. No. 2 -- 2012 |
Abstract |
In this modern world ATM is being used by
many of us. The security that is being currently used for ATM indeed has a few
backdoors and it can be improved further. For the same reason biometric
verification were introduced. But even the biometric system does not seem to be
completely reliable and hence a contingency plan is needed in order to prevent
catastrophes. Objective of this paper is to provide enhanced security to ATM by
enhancing the already proposed biometric system and making it still secured by
PII[Personal Identification Image] process. So a detailed study on various
existing biometric systems is studied and also its limitations are listed. This
paper proposes a novel method to meet out the challenges and strengthen the
security mechanism. In the proposed security algorithm two phases are defined.
These two phases provide two tier security and there by increases the security
of ATM machine. |
Keywords |
ATM Security Enhancement, Biometric In
ATM, Fingerprint In ATM Security,Fingerprint Verification, Image Processing In
ATM |
Full Text |
|
Title: |
IMPROVING DIVERSITY IN VIDEO RECOMMENDER
SYSTEMS AND THE DISCOVERY OF LONG TAIL |
Author: |
BHUVANESWARI A, KARTHIKEYAN M P, LAKSHMI
NARAYANAN T R |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 224 - 233 Vol 37. No. 2 -- 2012 |
Abstract |
The sharp growth of online-systems and
vast availability of high quality data lead to information overload,
increasingly very difficult for the online users to find most relevant content.
When looking for information about any movie, music, video, the internet users
come across a bewildering number of options to fetch precise data from the
recommended list. The main goal of the recommender system is to suggest high
quality and top rated videos to the user. However there exist thousands of video
items said to be Long Tail (videos with least rating) that stagnate idle on the
web server for years that are unrevealed by users because of its least rating.
The new recommender system introduced in this paper uses rating based binning
technique that favors not only top rated videos to get recommended, but also
recommend Long-Tail videos. This can improve diversity on recommendation and
suggest best long tail videos to the user. This implies that a least popular
video has a high probability to become more popular when it is placed on the
related video recommendation lists of popular videos. In order to evaluate the
proposed video recommender system, the datasets are crawled from YouTube©, a
well-liked online video community to suggest videos with high rating along with
less rated long tail videos. |
Keywords |
Recommender System, Long Tail, Information
Storage And Retrieval, Recommendation Diversity |
Full Text |
|
Title: |
AN EFFICIENT ALGORITHM FOR CLUSTERING
INTRUSION ALERT |
Author: |
ADELINA JOSEPHINE D, ANUSHIADEVI R,
LAKSHMI NARAYANAN T R |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 234 - 240 Vol 37. No. 2 -- 2012 |
Abstract |
Intrusion Detection System is an emerging
technology for detecting the unauthorized users and malicious behavior in a
system. Alert supervision is tedious in intrusion system, so Meta alerts are
created. Meta alerts are generated for appropriate clusters and they form a
generalization of alerts. The objective is to identify origin of these alerts.
In this paper, we propose a hybrid clustering algorithm which is applied to the
data set to cluster the alert. Online alert aggregation is applied to this data
which identifies the intruder .Redundant data are filtered during the process of
clustering and aggregation, which substantially reduces the false positive rate.
From the observed false positive, the origin of the alert are reduced. |
Keywords |
Intrusion Detection, Clustering, Meta
alert, Root-cause |
Full Text |
|
Title: |
E-MAIL CLASSIFICATION USING DEEP NETWORKS |
Author: |
AHMAD A. AL SALLAB, MOHSEN A. RASHWAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 241 - 251 Vol 37. No. 2 -- 2012 |
Abstract |
Email has become an essential
communication tool in modern life, creating the need to manage the huge
information generated. Email classification is a desirable feature in an email
client to manage the email messages and categorize them into semantic groups.
Statistical artificial intelligence and machine learning is a typical approach
to solve such problem, driven by the success of such methods in other areas of
knowledge management. Many classification methods exist, of which some have been
already applied to email classification task, like Naïve Bayes Classifiers and
SVM. Deep architectures of pattern classifiers represent a wide category of
classifiers. Recently, Deep Belief Networks have demonstrated good performance
in literature, driven by the fast learning algorithm using Restricted Boltzmann
Machine model by Hinton et al, and the improvement in computing power which
enables learning deep neural networks in reasonable time. Many datasets and
corpus exist for email classification, with the most famous one is Enron
dataset, made public by FERC, annotated and processed by many entities like SRI
and MIT. In this paper, a machine learning approach using Deep Belief Networks
is applied to email classification task, using the Enron dataset to train and
test the proposed model. |
Keywords |
Deep Belief Networks (DBN), Restricted
Boltzmann Machine (RBM), Knowledge Management, Email Classification, Enron Email
Dataset |
Full Text |
|
Title: |
DEVELOPMENT OF AN EFFICIENT VERTEX BASED
TEMPLATE EXTRACTION TECHNIQUE FOR WEB PAGES |
Author: |
N.P.K. GANESH KUMAR, Dr.N.K.
SAKTHIVEL |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 252 - 260 Vol 37. No. 2 -- 2012 |
Abstract |
World Wide Web is useful source of
information. Websites contains many web pages which automatically occupied by
common template with contents. In former system, TEXT template extraction
technique is used for template detection and also extract template from dynamic
web pages, but it extracts the entire site and stores in database. It provides
the unnecessary information for further processing. To overcome this problem,
Vertex based information extraction technique is used, which would improve the
web search results quality and web integration for dynamic web pages. To operate
at web scale, Vertex employs a host of novel algorithms for web page clustering,
robust wrapper learning, detecting site changes, and rule relearning
optimization. The system is deployed in production and currently extracts
millions of records from many websites, in order to get high efficiency. Vertex
is the first system to do high accuracy information mining at web scale. |
Keywords |
Clustering, Xpath Rule, Template
Extraction |
Full Text |
|
Title: |
ENHANCING MINE SAFETY WITH WIRELESS SENSOR
NETWORKS USING ZIGBEE TECHNOLOGY |
Author: |
P.RAGHURAM, VEERAMUTHU VENKATESH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 261 - 267 Vol 37. No. 2 -- 2012 |
Abstract |
In coal mines, whenever explosions occur,
the rescue work is done by rescue workers without any prior knowledge of the
environmental condition inside coal mine because the mine monitoring systems may
be destroyed or damaged. This makes the life of rescue workers very risky. It
also takes some time for the rescue workers to reach the spot. According to the
proposed system, a ZigBee network controlled automatic robot has been developed
for assisting rescuers. This system works even when a ZigBee node fails.
Whenever any explosions occur, the robot automatically detects the explosion,
finds the explosion location and enters the coal mine tunnel well before the
arrival of rescuers. It finds the location of accident, searches for survivors
to give them first aid at right time and informs the rescue team about
environmental conditions and about the survivors inside the coal mine. |
Keywords |
ZigBee, RSSI, PIC16, Personal area network
(PAN), Robot |
Full Text |
|
Title: |
POLICY-BASED APPROACH TO DETECT AND
RESOLVE POLICY CONFLICT FOR STATIC AND DYNAMIC ARCHITECTURE |
Author: |
ABDELHAMID ABDELHADIMANSOR, WAN M.N. WAN
KADIR, TONI ANWAR, HIDAYAH ELIAS |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 268 - 278 Vol 37. No. 2 -- 2012 |
Abstract |
Current research efforts are being
directed to commit with the long-term view of self-management properties for
wireless telecommunications. One of the key approaches that have been recognized
as an enabler of such a view is policy-based management. Policy-based management
has been mostly acknowledged as a methodology that provides flexibility,
scalability, adaptability and support to automatically assign network resources,
control Quality of Service and security, by considering administratively
specified rules. The hype of policy-based management was to commit with these
features in run-time as a result of changeable network conditions resulting from
the interactions of users, applications and existing resources. To detect and
resolve potential static and dynamic conflicts between the rules and
configurations from different administrative domains, a policy-based manager
coordination PobMC framework which is based on Event- Condition-Action (ECA) is
proposed in this paper. The framework is responsible of potential conflicts
between applications included in the system. Furthermore, the paper provides a
guideline to avoid policy conflicts between different domains configurations,
and resolve the conflicts during runtime. PobMC depends on, static and dynamic
analysis to reduce potential conflicts. The paper briefly outlines some of the
most prominent research issues that have been discussed for large-scale adoption
of policy-based systems. Then we present a description of the conflict detection
and resolution algorithms that achieves the automated enforcement of obligations
for resource-handling based on management policies. |
Keywords |
Policy-Based Management, Policy Conflict
Analysis, Dynamic Conflict, Static Conflict, Adaptive Software Architecture |
Full Text |
|
Title: |
PRE-SERVICE TEACHERS PERCEPTIONS TOWARDS
ACADEMIC BLOGGING |
Author: |
Dr. SAFAA MOHMMED AL-HEBAISHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 279 - 288 Vol 37. No. 2 -- 2012 |
Abstract |
The current paper aims at identifying
pre-service teachers’ perceptions towards academicblogging in higher education
institutions. Using the quantitative and qualitative approaches, aquestionnaire
and semi-structured interviews were administered to a sample of ELT pre-service
teachers (n = 38) enrolled in a course blog created mainly to discuss some of
the issues related to the “Principles of Curriculum Construction" course. The
results showed that the pre-service teachers held positive attitudes towards
blogs in various terms and perceived it as an effective tool in higher
education. Relevant recommendations included careful planning to incorporate
this tool for better future careers. |
Keywords |
Educational Blogging, Academic Blogging,
Pre-Service Teachers, Perception Towards Blogging |
Full Text |
|
Title: |
MODELING AND CONTROL OF A SINGLE-PHASE
GRID CONNECTED PHOTOVOLTAIC SYSTEM |
Author: |
M.MAKHLOUF, F.MESSAI, H.BENALLA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 289 - 296 Vol 37. No. 2 -- 2012 |
Abstract |
This paper at first presents a control
algorithm for a single-phase grid-connected photovoltaic system in which an
inverter designed for grid-connected photovoltaic arrays can synchronize a
sinusoidal current output with a voltage grid. This paper presents modeling,
controller design, and simulation study of a grid connected PV system. The
overall configuration of the grid connected PV system is present. The main
points discussed here are the MPP tracking algorithm, the synchronization of the
inverter and the connection to the grid. Tracking the dc voltage and current
allows MPP calculation which gives the inverter to function efficiently. We
apply the MPP equations to the PV array model and watch the inverter input and
output. In order to synchronize the simulated inverter to the grid the waveforms
from the grid are applied to the pulse width modulation (PWM) input and drive
appropriately the inverter’s IGBT’s. A Matlab/Simulink based simulation model is
developed for the system. A Simulation results are presented to show the overall
system performance. |
Keywords |
Grid connected PV systems, DC-DC boost
converter, harmonic filter, MPPT |
Full Text |
|
|
|